HARM: Hardware-assisted continuous re-randomization for microcontrollers J Shi, L Guan, W Li, D Zhang, P Chen, N Zhang 2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), 520-536, 2022 | 12 | 2022 |
Method to input content in a structured manner with real-time assistance and validation K Chen, P Chen, MJ Dutch, B Chen, CH Claudatos, F Shao US Patent 11,288,449, 2022 | 1 | 2022 |
Semantics-preserving reinforcement learning attack against graph neural networks for malware detection L Zhang, P Liu, YH Choi, P Chen IEEE Transactions on Dependable and Secure Computing 20 (2), 1390-1402, 2022 | 38 | 2022 |
A co-design adaptive defense scheme with bounded security damages against heartbleed-like attacks Z Hu, P Chen, M Zhu, P Liu IEEE Transactions on Information Forensics and Security 16, 4691-4704, 2021 | 4 | 2021 |
On convergence rates of game theoretic reinforcement learning algorithms Z Hu, M Zhu, P Chen, P Liu Automatica 104, 90-101, 2019 | 10 | 2019 |
Measuring performance of storage system Z Yang, C Fan, P Chen, X Chen, H Chen US Patent 10,203,907, 2019 | 1 | 2019 |
Set-based bugs discovery system via SQL query P Chen, K Chen, J Tao, MJ Dutch, M Chamness, B Chen US Patent 10,146,605, 2018 | | 2018 |
Feedback control can make data structure layout randomization more cost-effective under zero-day attacks P Chen, Z Hu, J Xu, M Zhu, P Liu Cybersecurity 1, 1-13, 2018 | 6 | 2018 |
System for discovering bugs using interval algebra query language K Chen, J Tao, P Chen, MJ Dutch, M Chamness, WD Andruss, B Chen, ... US Patent 10,061,681, 2018 | | 2018 |
ROPNN: Detection of ROP payloads using deep neural networks X Li, Z Hu, Y Fu, P Chen, M Zhu, P Liu arXiv preprint arXiv:1807.11110, 2018 | 11 | 2018 |
What you see is not what you get! thwarting just-in-time rop with chameleon P Chen, J Xu, Z Hu, X Xing, M Zhu, B Mao, P Liu 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 9 | 2017 |
Dancing with wolves: Towards practical event-driven vmm monitoring L Deng, P Liu, J Xu, P Chen, Q Zeng Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on …, 2017 | 26 | 2017 |
Postmortem program analysis with {Hardware-Enhanced}{Post-Crash} artifacts J Xu, D Mu, X Xing, P Liu, P Chen, B Mao 26th USENIX Security Symposium (USENIX Security 17), 17-32, 2017 | 56 | 2017 |
Towards a science for adaptive defense: Revisit server protection Z Hu, P Chen, Y Lu, M Zhu, P Liu 2016 IEEE 2nd International Conference on Collaboration and Internet …, 2016 | 1 | 2016 |
CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump J Xu, D Mu, P Chen, X Xing, P Wang, P Liu Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 54 | 2016 |
Demo: A Symbolic N-Variant System PL Jun Xu, Pinyao Guo, Bo Chen, Robert F Erbacher, Ping Chen Proceedings of the 2016 ACM Workshop on Moving Target Defense, 65-68, 2016 | | 2016 |
Hypervisor utilization to reduce bootstrap time for data storage system XC Ziye Yang, Xiaohong Qin, Lintao Wan, Ping Chen US Patent 9,354,896, 2016 | 8* | 2016 |
Method to input content in a structured manner with real-time assistance and validation K Chen, P Chen, MJ Dutch, B Chen, CH Claudatos, F Shao US Patent 9,317,189, 2016 | 4 | 2016 |
Set-based bugs discovery system via SQL query P Chen, K Chen, J Tao, MJ Dutch, M Chamness, B Chen US Patent 9,274,872, 2016 | | 2016 |
System for discovering bugs using interval algebra query language K Chen, J Tao, P Chen, MJ Dutch, M Chamness, WD Andruss, B Chen, ... US Patent 9,092,563, 2015 | 1 | 2015 |